Cyber Security Demand & Delivery Manager Job at Vodacom – Career Opportunity in Tanzania

Share and send to your friends !
Job Category: Management
Job Type: Full-Time
Deadline of this Job:  18 May 2021
Duty Station:  Dar es Salaam
Posted: 04-05-2021
Job Description

Vacancy title:
Cyber Security Demand & Delivery Manager

[ Type: FULL TIME , Industry: Media , Category: Management ]

Jobs at:


Deadline of this Job:
18 May 2021  

Duty Station:
Within Tanzania , Dar es Salaam , East Africa

Date Posted: Tuesday, May 04, 2021 , Base Salary: Not Disclosed


About Us
At Vodacom, we’re working hard to build a better future. A more connected, inclusive and sustainable world. As a dynamic global community, it's our human spirit, together with technology, that empowers us to achieve this.
We challenge and innovate in order to connect people, businesses, and communities across the world. Delighting our customers and earning their loyalty drive us, and we experiment, learn fast and get it done, together.
With us, you can be truly be yourself and belong, share inspiration, embrace new opportunities, thrive, and make a real difference.
Role purpose:
This role is responsible for effective, efficient and careful planning of Vodacom Tanzania cyber security projects and operations, to ensure very minimal business operations. This includes identification of security needs (demands), coordinating delivery of the needs and ensuring security operations are running as designed. Capacity growth and trends, management reports and presentations are also key responsibilities of this role. .

Key accountabilities and decision ownership:
Impact on the business
•Own demand planning and forecasting for Technology security, for all systems, services and processes within the portfolio, working together with vendors and internal customers
•Coordinate delivery and assessment of cyber security baselines (CSBs) across all Vodacom relevant business areas and processes
•Perform internal controls self-assessment (CSAs) to validate compliance to security policies, such as user access management, information security and Technology security policies.
•Ensure adequacy coverage of Security tooling across technologies.
•Lead security implementation within emerging technologies, including Infrastructure, IOT, Cloud and Office IT Security

Customers, supplier and third parties
•Monitor compliance of the Technology security managed services contract, to ensure it is within agreed SLA
•Ensure proper implementation and change management process compliance for all planned and emergency changes in Technology systems

Leadership and teamwork
•Monitor and minimize licenses utilization charges as a result of excess usage of un-needed services
•Owner of the Technology Security Incidents, Requests, Changes and Escalation processes, ensuring high levels of performance in these processes, accurate reporting and establishing service improvement activities when required
•Be accountable for the quality of Service and performance; ensuring future demand from growth and projects is understood and factored into capacity plans for all associated Technology security systems
•Provide regular and accurate management reporting on Technology security service performance. This includes management KPIs reports and SLA reports
•Continuous improve and Ensure proper validation, timely completion and accuracy of audit checklists and user access rights review for Technology areas.

Innovation and change
•Delivery of Technology security services and operations to ensure operational metrics are optimized
•Drive continuous improvement through simplification of key cyber security processes

•Drive internal and third party service review meetings covering performance, service improvements, quality and processes
•Make recommendations for Technology security service Improvement Plans and ensure actions are followed through to completion in a timely manner
•Responsible for chairing and driving Management and/or Technical conference calls and discussions, and escalations, related to cyber Prevent, defence and delivery
•Ensure licenses and support renewals for all security products are performed well in advance of expiry, to avoid service interruptions

•Good communication skills
•Excellent interpersonal skills;
•High level negotiation skills;
•Extensive computer user knowledge and skills essential
•Strong analytical skills;
•Excellent planning and organizing skills.
•Good business acumen
•Project Management skills
•Conflict resolution skills
•Ability to work independently and under pressure.

Risk and Compliance

Qualifications, Competences & Experience
Must have technical / professional qualifications:
•Bachelor of Science Degree in Telecommunications, Information/Cyber Security, Information technology or Computer Science
•Security certifications (CEH, GCIA, CISM, CISA, CISSP or equivalent) will be an added advantage
•Minimum of Five experience in Technology Systems three of those in security and/or Cyber security field
•Advanced knowledge of mobile telecommunications network architectures, IT systems, networks and applications.
•A reputation for self-motivation, integrity, cultural sensitivity and strong interpersonal skills

Work Hours: 8

Experience in Months: 60

Level of Education:
Bachelor Degree

Job application procedure
Interested applicants please visit: